Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software
暂无分享,去创建一个
Adriano Valenzano | Luca Durante | Riccardo Sisto | Davide Pozza | R. Sisto | L. Durante | A. Valenzano | D. Pozza
[1] Pascal Meunier,et al. Can source code auditing software identify common vulnerabilities and be used to evaluate software security? , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[2] M. Weber,et al. A case study in detecting software security vulnerabilities using constraint optimization , 2001, Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation.
[3] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[4] Linda Pesante,et al. CERT® Coordination Center , 2002 .
[5] Tadayoshi Kohno,et al. Token-based scanning of source code for security problems , 2002, TSEC.
[6] Paul Anderson,et al. Tool Support for Fine-Grained Software Inspection , 2003, IEEE Softw..
[7] John Wilander,et al. A Comparison of Publicly Available Tools for Static Intrusion Prevention , 2002 .
[8] Kyung-Suk Lhee,et al. Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..
[9] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.